SlideShare a Scribd company logo
1 of 7
Download to read offline
Ethics
Chulantha Kulasekere
Department of Electronic and Computer Engineering
Sri Lanka Institute of Information Technology
chulantha.k@sliit.lk

October 12,2013

ECK/2013 (SLIIT)

FCCS

October 12, 2013

1/5
Ethics and Cyber Security
Why is ethics important from the point of view of cyber security?
It is critical to understand the ethical responsibilities of your work as you
will be dealing with privacy and secrecy issues

All security setups and incident investigations have a legal and ethical
components.
How you deal with the ethical component of your work is crucial as it
can increase the liability of both your organization and yourself.
Organizations should demand that the employees have a strong ethical
behavior.
Security setup, as mentioned before, specifies the rules and procedures
which ultimately determine the behavior of employees.
A computer security professional maintains security by developing and
helping with the implementation of security policies.
The security policies are enforceable when the following requirements
are met:
the policy has been communicated to all staff
the policy is easily comprehended by all staff
compliance with the policy is agreed with by the staff
the enforcement is uniform and consistent
ECK/2013 (SLIIT)

FCCS

October 12, 2013

2/5
Ethics and Professional Organizations
There is no universal binding ethics code for computer security
professionals.
Different international professional organizations (ACM, SANS,
ISACA) provide their own guidelines on ethical behavior.
Information Systems Audit and Control Association (ISACA):
https://www.isaca.org
SANS Training Institute: http://www.sans.org/
Association for Computing Machinery (ACM) Special group on Security,
Audit and Control (SIGSAC): http://www.sigsac.org/

The Australian Computer Society has its own recommendations on
ethics.

ECK/2013 (SLIIT)

FCCS

October 12, 2013

3/5
Ethics Rules
http://computerethicsinstitute.org/images/TheTenCommandmentsOfComputerEthics.pdf

The ethics rules specified by the Computer Ethics Institute are as
follows:
Thou shalt not use a computer to harm other people.
Thou shalt not interfere with other people’s computer work.
Thou shalt not snoop around in other people’s computer files.
Thou shalt not use a computer to steal.
Thou shalt not use a computer to bear false witness.
Thou shalt not copy or use proprietary software for which you have not
paid.
Thou shalt not use other people’s computer resources without
authorization or proper compensation.
Thou shalt not appropriate other people’s intellectual output.
Thou shalt think about the social consequences of the program you are
writing or the system you are designing.
Thou shalt always use a computer in ways that ensure consideration and
respect for your fellow humans.

ECK/2013 (SLIIT)

FCCS

October 12, 2013

4/5
Ethics and Ethical Behavior
Ethics and ethical behavior vary depending on the country or culture
that one has interaction with.
This is a significant problem especially when attempting to handle
groups across area with different ethical expectations and enforcement
mechanisms.
Education and training are key in reducing unethical behavior.
Causes of unethical behavior:
Ignorance
Accident
Intent

ECK/2013 (SLIIT)

FCCS

October 12, 2013

5/5
Preventing Unethical Behavior
The computer security professionals have a responsibility to prevent
unethical or illegal behavior.
Deterrence can be enhanced if there is a concerted effort to highlight
through training the type of behavior that is unacceptable and the
consequences of such behavior, specifically one needs to ensure that:
the penalty is appropriate to discourage repeat offending
the likelihood that the offense is detected is high
the enforcement of the penalties is carried out according to the security
policy

ECK/2013 (SLIIT)

FCCS

October 12, 2013

6/5
Ethical Issues in Cyber Security
Security rights
Hackers
Domains
Illegal Downloading of Material
Private vs public information
Commercial collection of personal information
Misuse of corporate resources
Software piracy

ECK/2013 (SLIIT)

FCCS

October 12, 2013

7/5

More Related Content

What's hot

Technology, Shrinking Markets, and Tough Times
Technology, Shrinking Markets, and Tough TimesTechnology, Shrinking Markets, and Tough Times
Technology, Shrinking Markets, and Tough TimesEvolve Law
 
The Software Engineering Code and the ACM Code
The Software Engineering Code and the ACM CodeThe Software Engineering Code and the ACM Code
The Software Engineering Code and the ACM CodeAhmed Elshal
 
Software Engineering code of ethics and professional practice of IEEE
Software Engineering code of ethics and professional practice of IEEESoftware Engineering code of ethics and professional practice of IEEE
Software Engineering code of ethics and professional practice of IEEESamsuddoha Sams
 
Professional Ethics
Professional EthicsProfessional Ethics
Professional EthicsIMAD HASSAN
 
Ethical issues in software testing v4
Ethical issues in software testing v4Ethical issues in software testing v4
Ethical issues in software testing v4Scott Allman
 

What's hot (9)

Technology, Shrinking Markets, and Tough Times
Technology, Shrinking Markets, and Tough TimesTechnology, Shrinking Markets, and Tough Times
Technology, Shrinking Markets, and Tough Times
 
The Software Engineering Code and the ACM Code
The Software Engineering Code and the ACM CodeThe Software Engineering Code and the ACM Code
The Software Engineering Code and the ACM Code
 
Software Engineering code of ethics and professional practice of IEEE
Software Engineering code of ethics and professional practice of IEEESoftware Engineering code of ethics and professional practice of IEEE
Software Engineering code of ethics and professional practice of IEEE
 
Professional Ethics
Professional EthicsProfessional Ethics
Professional Ethics
 
Se ethics
Se ethicsSe ethics
Se ethics
 
Ethical issues in software testing v4
Ethical issues in software testing v4Ethical issues in software testing v4
Ethical issues in software testing v4
 
Social & Ethical Issues in Information Systems
Social & Ethical Issues in Information SystemsSocial & Ethical Issues in Information Systems
Social & Ethical Issues in Information Systems
 
Aspa ai webinar
Aspa   ai webinarAspa   ai webinar
Aspa ai webinar
 
501 Presentation 10-9
501 Presentation 10-9501 Presentation 10-9
501 Presentation 10-9
 

Viewers also liked (6)

Talk2012
Talk2012Talk2012
Talk2012
 
Agriculture and information technology
Agriculture and information technologyAgriculture and information technology
Agriculture and information technology
 
02.security systems
02.security systems02.security systems
02.security systems
 
Ethics presentation
Ethics presentationEthics presentation
Ethics presentation
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Ethics
EthicsEthics
Ethics
 

Similar to 03.ethics

Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9sajida zafar
 
AssignmentRespond to two or more of your classmates in one or m.docx
AssignmentRespond to two or more of your classmates in one or m.docxAssignmentRespond to two or more of your classmates in one or m.docx
AssignmentRespond to two or more of your classmates in one or m.docxnormanibarber20063
 
STUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdfSTUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdf503SaranyaS
 
chapter 6 Ethics and Professionalism of ET.pptx
chapter 6   Ethics and Professionalism of ET.pptxchapter 6   Ethics and Professionalism of ET.pptx
chapter 6 Ethics and Professionalism of ET.pptxAmanuelZewdie4
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFLaurie Mosca-Cocca
 
Article - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfArticle - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfEnov8
 
From Law to Code: Translating Legal Principles into Digital Rules
From Law to Code: Translating Legal Principles into Digital RulesFrom Law to Code: Translating Legal Principles into Digital Rules
From Law to Code: Translating Legal Principles into Digital RulesRónán Kennedy
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfDigital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfMahdi_Fahmideh
 
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docxBHANU281672
 
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docxlorainedeserre
 
اخلاقيات الثاني
اخلاقيات الثانياخلاقيات الثاني
اخلاقيات الثانيBunayan ALdosari
 
ethics and it project management
ethics and it project managementethics and it project management
ethics and it project managementJennifer Cabrera
 
Final professional ethics for midterm(1)
Final professional ethics for midterm(1)Final professional ethics for midterm(1)
Final professional ethics for midterm(1)JUNAIDJUANID
 
AI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry StandardsAI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry StandardsAnsgar Koene
 

Similar to 03.ethics (20)

Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
AssignmentRespond to two or more of your classmates in one or m.docx
AssignmentRespond to two or more of your classmates in one or m.docxAssignmentRespond to two or more of your classmates in one or m.docx
AssignmentRespond to two or more of your classmates in one or m.docx
 
STUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdfSTUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdf
 
chapter 6 Ethics and Professionalism of ET.pptx
chapter 6   Ethics and Professionalism of ET.pptxchapter 6   Ethics and Professionalism of ET.pptx
chapter 6 Ethics and Professionalism of ET.pptx
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
 
Article - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfArticle - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdf
 
From Law to Code: Translating Legal Principles into Digital Rules
From Law to Code: Translating Legal Principles into Digital RulesFrom Law to Code: Translating Legal Principles into Digital Rules
From Law to Code: Translating Legal Principles into Digital Rules
 
Ethics in IT.pptx
Ethics in IT.pptxEthics in IT.pptx
Ethics in IT.pptx
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
P.practices-week-2.pptx
P.practices-week-2.pptxP.practices-week-2.pptx
P.practices-week-2.pptx
 
Ethical issues
Ethical issuesEthical issues
Ethical issues
 
Security policy.pdf
Security policy.pdfSecurity policy.pdf
Security policy.pdf
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfDigital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
 
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx
 
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx
 
اخلاقيات الثاني
اخلاقيات الثانياخلاقيات الثاني
اخلاقيات الثاني
 
ethics and it project management
ethics and it project managementethics and it project management
ethics and it project management
 
Final professional ethics for midterm(1)
Final professional ethics for midterm(1)Final professional ethics for midterm(1)
Final professional ethics for midterm(1)
 
AI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry StandardsAI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry Standards
 

Recently uploaded

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

03.ethics

  • 1. Ethics Chulantha Kulasekere Department of Electronic and Computer Engineering Sri Lanka Institute of Information Technology chulantha.k@sliit.lk October 12,2013 ECK/2013 (SLIIT) FCCS October 12, 2013 1/5
  • 2. Ethics and Cyber Security Why is ethics important from the point of view of cyber security? It is critical to understand the ethical responsibilities of your work as you will be dealing with privacy and secrecy issues All security setups and incident investigations have a legal and ethical components. How you deal with the ethical component of your work is crucial as it can increase the liability of both your organization and yourself. Organizations should demand that the employees have a strong ethical behavior. Security setup, as mentioned before, specifies the rules and procedures which ultimately determine the behavior of employees. A computer security professional maintains security by developing and helping with the implementation of security policies. The security policies are enforceable when the following requirements are met: the policy has been communicated to all staff the policy is easily comprehended by all staff compliance with the policy is agreed with by the staff the enforcement is uniform and consistent ECK/2013 (SLIIT) FCCS October 12, 2013 2/5
  • 3. Ethics and Professional Organizations There is no universal binding ethics code for computer security professionals. Different international professional organizations (ACM, SANS, ISACA) provide their own guidelines on ethical behavior. Information Systems Audit and Control Association (ISACA): https://www.isaca.org SANS Training Institute: http://www.sans.org/ Association for Computing Machinery (ACM) Special group on Security, Audit and Control (SIGSAC): http://www.sigsac.org/ The Australian Computer Society has its own recommendations on ethics. ECK/2013 (SLIIT) FCCS October 12, 2013 3/5
  • 4. Ethics Rules http://computerethicsinstitute.org/images/TheTenCommandmentsOfComputerEthics.pdf The ethics rules specified by the Computer Ethics Institute are as follows: Thou shalt not use a computer to harm other people. Thou shalt not interfere with other people’s computer work. Thou shalt not snoop around in other people’s computer files. Thou shalt not use a computer to steal. Thou shalt not use a computer to bear false witness. Thou shalt not copy or use proprietary software for which you have not paid. Thou shalt not use other people’s computer resources without authorization or proper compensation. Thou shalt not appropriate other people’s intellectual output. Thou shalt think about the social consequences of the program you are writing or the system you are designing. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans. ECK/2013 (SLIIT) FCCS October 12, 2013 4/5
  • 5. Ethics and Ethical Behavior Ethics and ethical behavior vary depending on the country or culture that one has interaction with. This is a significant problem especially when attempting to handle groups across area with different ethical expectations and enforcement mechanisms. Education and training are key in reducing unethical behavior. Causes of unethical behavior: Ignorance Accident Intent ECK/2013 (SLIIT) FCCS October 12, 2013 5/5
  • 6. Preventing Unethical Behavior The computer security professionals have a responsibility to prevent unethical or illegal behavior. Deterrence can be enhanced if there is a concerted effort to highlight through training the type of behavior that is unacceptable and the consequences of such behavior, specifically one needs to ensure that: the penalty is appropriate to discourage repeat offending the likelihood that the offense is detected is high the enforcement of the penalties is carried out according to the security policy ECK/2013 (SLIIT) FCCS October 12, 2013 6/5
  • 7. Ethical Issues in Cyber Security Security rights Hackers Domains Illegal Downloading of Material Private vs public information Commercial collection of personal information Misuse of corporate resources Software piracy ECK/2013 (SLIIT) FCCS October 12, 2013 7/5